Watch this video on YouTube
During a security audit, how would you test for susceptibility to a zero-day exploit in a widely used software application?